Group-Based Private Authentication, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. ,
DOI : 10.1109/WOWMOM.2007.4351808
Reducing Time Complexity in RFID Systems, Selected Areas in Cryptography, 2005. ,
DOI : 10.1007/11693383_20
A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography, RFIDSec2008 ? Proceedings of the 4th Workshop on RFID Security, 2008. ,
PRESENT: An Ultra-Lightweight Block Cipher, CHES 2007, pp.450-366, 2007. ,
DOI : 10.1007/978-3-540-74735-2_31
Hash Functions and RFID Tags: Mind the Gap, CHES 2008, pp.283-299, 2008. ,
DOI : 10.1007/978-3-540-85053-3_18
Using Elliptic Curves on RFID Tags, International Journal of Computer Science and Network Security, vol.2, pp.1-9, 2008. ,
Optimal Key-Trees for Tree-Based Private Authentication, Privacy Enhancing Technologies, 2006. ,
DOI : 10.1007/11957454_19
Strong Authentication for RFID Systems Using the AES Algorithm, CHES 2004, pp.357-370, 2004. ,
DOI : 10.1007/978-3-540-28632-5_26
Advanced Security Mechanisms for Machine Readable Travel Documents: Extended Access Control, Password Authenticated Connection Establishment (PACE), and Restricted Identification (RI), Version 2.02, 2009. ,
Robust Threshold DSS Signatures, Advances in Cryptology ? EUROCRYPT 1996, 1996. ,
HIGHT: A New Block Cipher Suitable for Low-Resource Device, CHES 2006, pp.46-59, 2006. ,
DOI : 10.1007/11894063_4
Threshold DSS Signatures without a Trusted Party, Advances in Cryptology ? CRYPTO 1995, pp.397-409, 1995. ,
DOI : 10.1007/3-540-44750-4_32
Multi-Domain RFID Access Control Using Asymmetric Key Based Tag-Reader Mutual Authentication, ICAS2008 ? Proceedings of the 26th international Congress of the Aeronautical Sciences, 2008. ,
mCryption ? A Lightweight Block Cipher for Security of Low-cost RFID Tags and Sensors, WISA 2005, pp.243-258, 2005. ,
Two-party generation of DSA signatures, Advances in Cryptology ? CRYPTO 2001, 2001. ,
DOI : 10.1007/s001450010003
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs, Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots , WMASH '05, pp.1-13, 2005. ,
DOI : 10.1145/1080730.1080732
Privacy and security in library RFID, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004. ,
DOI : 10.1145/1030083.1030112